General
-
Target
1878bc4fb83d1d8e2f904706be0b64f11dccc65e70abfb5b905d9d712a1cbc32
-
Size
1.1MB
-
Sample
230302-genf2abf62
-
MD5
8b343a06f9b2acd91beffac8d500a485
-
SHA1
3a2e1f4600a5aef9171b55797fd22f7d736d0b52
-
SHA256
1878bc4fb83d1d8e2f904706be0b64f11dccc65e70abfb5b905d9d712a1cbc32
-
SHA512
adb691649bfe7adcc9993c3f7d02e83bc7411809074d4de998cc5dc691833da86c249ce582567dca578bc7ea93cd77d05e007d4b8ae6c346dd36cc37ef4ce2e0
-
SSDEEP
24576:6yjJVgIWR7Mmk1M25KkXk8lRX5q3Ngjr3:BFuIWpMz195KsRpq3
Static task
static1
Behavioral task
behavioral1
Sample
1878bc4fb83d1d8e2f904706be0b64f11dccc65e70abfb5b905d9d712a1cbc32.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
durov
193.56.146.11:4162
-
auth_value
337984645d237df105d30aab7013119f
Targets
-
-
Target
1878bc4fb83d1d8e2f904706be0b64f11dccc65e70abfb5b905d9d712a1cbc32
-
Size
1.1MB
-
MD5
8b343a06f9b2acd91beffac8d500a485
-
SHA1
3a2e1f4600a5aef9171b55797fd22f7d736d0b52
-
SHA256
1878bc4fb83d1d8e2f904706be0b64f11dccc65e70abfb5b905d9d712a1cbc32
-
SHA512
adb691649bfe7adcc9993c3f7d02e83bc7411809074d4de998cc5dc691833da86c249ce582567dca578bc7ea93cd77d05e007d4b8ae6c346dd36cc37ef4ce2e0
-
SSDEEP
24576:6yjJVgIWR7Mmk1M25KkXk8lRX5q3Ngjr3:BFuIWpMz195KsRpq3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-